compliance Cyber Security pentest zero- day vulnerability HIPAA escalation resilience EDR packet BEC IDS passphrase rootkit OS antivirus worm PII spam incident network business continuity social engineering IPS cyber attack ransomware phishing IP APT firewall defense evasion password DDoS botnet risk assessment FTP spoofing Proofpoint incident response spyware IoT exploit virus SyssecAdmin Dark Web hacker admin encryption WISP risk vishing cryptography CIA triad Cyber Defense training malware VPN security awareness insider threat bug MFA IOC Defense- in-depth integrity breach security policy availability identity theft Security Operations confidentiality smishing PHI compliance Cyber Security pentest zero- day vulnerability HIPAA escalation resilience EDR packet BEC IDS passphrase rootkit OS antivirus worm PII spam incident network business continuity social engineering IPS cyber attack ransomware phishing IP APT firewall defense evasion password DDoS botnet risk assessment FTP spoofing Proofpoint incident response spyware IoT exploit virus SyssecAdmin Dark Web hacker admin encryption WISP risk vishing cryptography CIA triad Cyber Defense training malware VPN security awareness insider threat bug MFA IOC Defense- in-depth integrity breach security policy availability identity theft Security Operations confidentiality smishing PHI
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
compliance
Cyber Security
pentest
zero-day
vulnerability
HIPAA
escalation
resilience
EDR
packet
BEC
IDS
passphrase
rootkit
OS
antivirus
worm
PII
spam
incident
network
business continuity
social engineering
IPS
cyber attack
ransomware
phishing
IP
APT
firewall
defense evasion
password
DDoS
botnet
risk assessment
FTP
spoofing
Proofpoint
incident response
spyware
IoT
exploit
virus
SyssecAdmin
Dark Web
hacker
admin
encryption
WISP
risk
vishing
cryptography
CIA triad
Cyber Defense
training
malware
VPN
security awareness
insider threat
bug
MFA
IOC
Defense-in-depth
integrity
breach
security policy
availability
identity theft
Security Operations
confidentiality
smishing
PHI